• Aucun résultat trouvé

Informative References

[Ahn] Ahn, L., Blum, M., and J. Langford, "Telling humans and computers apart automatically", Communications of the ACM, vol. 47, no. 2, February 2004.

[Androutsellis-Theotokis]

Androutsellis-Theotokis, S. and D. Spinellis, "A survey of peer-to-peer content distribution technologies", ACM CSUR, vol. 36, no. 4, December 2004.

[BITTORRENT] "BitTorrent", <http://www.bittorrent.com/>.

[Baset] Baset, S. and H. Schulzrinne, "An analysis of the skype peer-to-peer internet telephony protocol", Proceedings of IEEE INFOCOM 2006, April 2006.

[Baumann] Baumann, R., Cavin, S., and S. Schmid, "Voice Over IP - Security and SPIT", Technical Report, University of Berne, September 2006.

[COOLSTREAM] "COOLSTREAMING", <http://www.coolstreaming.us>.

[Castro] Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and D. Wallach, "Secure routing for structured peer-to-peer overlay networks", Proceedings of 5th symposium on Operating systems design and

implementation, December 2002.

[Chellapilla] Chellapilla, K. and P. Simard, "Using Machine Learning to Break Visual Human Interaction Proofs (HIPs)", Proceedings of Advances in Neural Information Processing Systems, December 2004.

[Condie] Condie, T., Kacholia, V., Sankararaman, S.,

Hellerstein, J., and P. Maniatis, "Maelstorm: Churn as Shelter", Proceedings of 13th Annual Network and

Distributed System Security Symposium, November 2005.

[Damiani] Damiani, E., Vimercati, D., Paraboschi, S., Samarati, P., and F. Violante, "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks", Proceedings of Conference on Computer and

Communications Security, November 2002.

[Danezis] Danezis, G., Lesniewski-Laas, C., Kaashoek, M., and R.

Anderson, "Sybil-resistant DHT routing", Proceedings of 10th European Symposium on Research in Computer Security, September 2005.

[Douceur] Douceur, J., "The Sybil Attack", Revised Papers from First International Workshop on Peer-to-Peer Systems, March 2002.

[Gurbani] Gurbani, V., Willis, D., and F. Audet,

"Cryptographically Transparent Session Initiation Protocol (SIP) Proxies", Proceedings of IEEE ICC ’07, June 2007.

[KAZAA] "KaZaa", <http://www.kazaa.com/>.

[Kamvar] Kamvar, S., Garcia-Molina, H., and M. Schlosser, "The EigenTrust Algorithm for Reputation Management in P2P Networks", Proceedings of 12th international

conference on World Wide Web, May 2003.

[Kim] Kim, Y., Mazzocchi, D., and G. Tsudik, "Admission Control in Peer Groups", Proceedings of Second IEEE International Symposium on Network Computing and Applications, April 2003.

[Kong] Kong, J., Zerfos, P., Luo, H., Lu, S., and L. Zhang, "Providing robust and ubiquitous security support for MANET", Proceedings of 9th International Conference on Network Protocols, November 2001.

[Lee] Lee, S., Kwon, O., Kim, J., and S. Hong, "A Reputation Management System in Structured Peer-to-Peer

Networks", Proceedings of 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, June 2005.

[Liang] Liang, J., Kumar, R., Xi, Y., and K. Ross, "Pollution in p2p file sharing systems", Proceedings of IEEE INFOCOM 2005, March 2005.

[Marti] Marti, S., Ganesan, P., and H. Garcia-Molina, "SPROUT:

P2P Routing with Social Networks", Proceedings of First International Workshop on Peer-to-Peer and Databases, March 2004.

[Maymounkov] Maymounkov, P. and D. Mazi, "Kademlia: A Peer-to-peer Information System Based on the XOR Metric",

Proceedings of First International Workshop on Peer-to-peer Systems, March 2002.

[McCue] McCue, Andy., "Bookie reveals 100,000 cost of

denial-of-service extortion attacks", available from http://www.silicon.com, June 2004.

[NAPSTER] "Napster", <http://www.napster.com/>.

[Ohta] Ohta, K., Micali, S., and L. Reyzin, "Accountable Subgroup Multisignatures", Proceedings of 8th ACM conference on Computer and Communications Security, November 2001.

[P2PSIP] "Peer-to-Peer Session Initiation Protocol (P2PSIP) IETF Working Group",

<http://www.ietf.org/html.charters/

p2psip-charter.html>.

[P2PSIP-DIAG] Yongchao, S., Jiang, X., Even, R., and D. Bryan, "P2PSIP Overlay Diagnostics", Work in Progress, December 2009.

[PPLIVE] "PPLive", <http://www.pplive.com>.

[Poon] Poon, W. and R. Chang, "Robust Forwarding in

Structured Peer-to-Peer Overlay Networks", Proceedings of ACM SIGCOMM 2004, August 2004.

[Pouwelse] Pouwelse, J., Garbacki, P., Epema, D., and H. Sips, "The Bittorent P2P File-Sharing System: Measurements and Analysis", Proceedings of 4th International Workshop of Peer-to-peer Systems, February 2005.

[RFC2818] Rescorla, E., "HTTP Over TLS", RFC 2818, May 2000.

[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G.,

Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002.

[RFC3711] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and K. Norrman, "The Secure Real-time Transport Protocol (SRTP)", RFC 3711, March 2004.

[RFC4981] Risson, J. and T. Moors, "Survey of Research towards Robust Peer-to-Peer Networks: Search Methods",

RFC 4981, September 2007.

[Ratnasamy] Ratnasamy, S., Francis, P., Handley, M., Karp, R., and S. Shenker, "A Scalable Content-Addressable Network", Proceedings of ACM SIGCOMM 2001, January 2001.

[Rowaihy] Rowaihy, H., Enck, W., McDaniel, P., and T. Porta, "Limiting Sybil attacks in structured peer-to-peer networks", Proceedings of IEEE INFOCOM 2007, May 2007.

[Rowstron] Rowstron, A. and P. Druschel, "Pastry: Scalable, distributed object location and routing for

large-scale peer-to-peer systems", Proceedings of 18th IFIP/ACM International Conference on Distributed

Systems Platforms (Middleware 2001), November 2001.

[SHA1] 180-1, FIPS., "Secure Hash Standard", April 2005.

[SKYPE] "Skype", <http://www.skype.com/>.

[Saxena] Saxena, N., Tsudik, G., and J. Yi, "Admission Control in Peer-to-Peer: Design and Performance Evaluation", Proceedings of 1st ACM workshop on Security of ad hoc and sensor networks, October 2003.

[Scheideler] Scheideler, C., "How to Spread Adversarial Nodes?:

Rotate!", Proceedings of 37th Annual ACM Symposium on Theory of Computing, May 2005.

[Seedorf1] Seedorf, J., "Security Challenges for Peer-to-Peer SIP", IEEE Network, vol. 20, no. 5, September 2006.

[Seedorf2] Seedorf, J., "Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP", Proceedings of 3rd Annual VoIP Security Workshop, June 2006.

[Singh] Singh, K. and H. Schulzrinne, "Peer-to-Peer Internet Telephony using SIP", Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video, June 2005.

[Sit] Sit, E. and R. Morris, "Security considerations for peer- to-peer distributed hash tables", Revised Papers from First International Workshop on Peer-to-Peer Systems, March 2002.

[Stoica] Stoica, I., Morris, R., Karger, D., Kaashoek, M., and H. Balakrishnan, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications", Proceedings of Applications, Technologies, Architectures, and Protocols for Computer Communication 2001, May 2001.

[Tam] Tam, J., Simsa, J., Hyde, S., and L. Ahn, "Breaking Audio CAPTCHAs with Machine Learning Techniques", Proceedings of Advances in Neural Information Processing Systems, December 2009.

[Uzun] Uzun, E., Pariente, M., and A. Selpk, "A

Reputation-Based Trust Management System for P2P Networks", Proceedings of International Symposium on Cluster Computing and the Grids, April 2004.

[Wallach] Wallach, D., "A Survey of Peer-to-Peer Security Issues", Proceedings of International Symposium of Software Security 2002, November 2002,

<http://www.cs.rice.edu/˜dwallach/pub/

tokyo-p2p2002.pdf>.

[Yu] Yu, H., Kaminsky, M., Gibbons, P., and A. Flaxman, "SybilGuard: Defending Against Sybil Attacks via Social Networks", Proceedings of ACM SIGCOMM 2006, September 2006.

[Zhang] Zhang, X., Chen, S., and R. Sandhu, "Enhancing Data Authenticity and Integrity in P2P Systems", IEEE Internet Computing, vol. 9, no. 6, September 2005.

[Zimmermann] Zimmermann, Philip., "Pretty good privacy: public key encryption for the masses", Building in big brother:

the cryptographic policy debate pag. 103-107, 1995.

Authors’ Addresses Henning Schulzrinne Columbia University 1214 Amsterdam Avenue New York, NY 10027 USA

EMail: hgs@cs.columbia.edu

Enrico Marocco Telecom Italia

Via G. Reiss Romoli, 274 Turin 10148

Italy

EMail: enrico.marocco@telecomitalia.it

Emil Ivov

SIP Communicator / University of Strasbourg 4 rue Blaise Pascal

Strasbourg Cedex F-67070 France

EMail: emcho@sip-communicator.org

Documents relatifs